Secure NOMA communication eavesdropped by energy harvesting-capable receiver with jamming
Author affiliations
DOI:
https://doi.org/10.15625/1813-9663/21772Keywords:
Secrecy performance, energy harvesting, jammer, non-orthogonal multiple access.Abstract
Non-orthogonal multiple access (NOMA) enables simultaneous transmissions of a huge quantity of wireless users on the same system resources (time, frequency, space), significantly improving spectral efficiency. Also, harvesting radio frequency energy for wireless communication not only saves energy resource but also makes communication greener. However, an energy harvesting-capable eavesdropper can be one of NOMA receivers, threatening security of NOMA communication. This paper secures NOMA communication eavesdropped by the energy harvesting-capable receiver by utilizing a jammer. The secrecy performance of the proposed system model is analyzed thoroughly and corroborated by computer simulations. Moreover, its secrecy performance is demonstrated to be superior to three different reference models. Furthermore, we secure the proposed system model at best by properly configuring critical system parameters.
Downloads
Published
How to Cite
Issue
Section
License
1. We hereby assign copyright of our article (the Work) in all forms of media, whether now known or hereafter developed, to the Journal of Computer Science and Cybernetics. We understand that the Journal of Computer Science and Cybernetics will act on my/our behalf to publish, reproduce, distribute and transmit the Work.2. This assignment of copyright to the Journal of Computer Science and Cybernetics is done so on the understanding that permission from the Journal of Computer Science and Cybernetics is not required for me/us to reproduce, republish or distribute copies of the Work in whole or in part. We will ensure that all such copies carry a notice of copyright ownership and reference to the original journal publication.
3. We warrant that the Work is our results and has not been published before in its current or a substantially similar form and is not under consideration for another publication, does not contain any unlawful statements and does not infringe any existing copyright.
4. We also warrant that We have obtained the necessary permission from the copyright holder/s to reproduce in the article any materials including tables, diagrams or photographs not owned by me/us.

